Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 22:19
Behavioral task
behavioral1
Sample
764b2530d5d53eb19a16030f1acbc810_NEIKI.exe
Resource
win7-20240419-en
General
-
Target
764b2530d5d53eb19a16030f1acbc810_NEIKI.exe
-
Size
442KB
-
MD5
764b2530d5d53eb19a16030f1acbc810
-
SHA1
97b8e007ccde836487648b4f9ad0b031fd92e1d4
-
SHA256
8883fe5419b8e9a2c69f780814b186b7e95a54234d3ae3cdf1f520191c6a17a3
-
SHA512
27521a928b2e51aae18417896a976b9a0e41e2a98d6633ee3fa3f2ddf1436532b804d4971d5975fffd318f7a7313627ab0630db2aa3e92c461efc1c3306d8d33
-
SSDEEP
6144:r/o4H3gaDLFHlB7goSsj/ZQUWvYqDUbsbX6EdK77RXW7VGwrLO8O77v:rgA3gaDdAoSOWUWvXbX5g7pW7JM
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
121.88.5.182
112.223.217.101
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 764b2530d5d53eb19a16030f1acbc810_NEIKI.exe -
Executes dropped EXE 1 IoCs
pid Process 900 sander.exe -
resource yara_rule behavioral2/memory/400-0-0x00000000009A0000-0x0000000000A3E000-memory.dmp upx behavioral2/files/0x00070000000232a4-6.dat upx behavioral2/memory/900-10-0x0000000000980000-0x0000000000A1E000-memory.dmp upx behavioral2/memory/400-14-0x00000000009A0000-0x0000000000A3E000-memory.dmp upx behavioral2/memory/900-17-0x0000000000980000-0x0000000000A1E000-memory.dmp upx behavioral2/memory/900-18-0x0000000000980000-0x0000000000A1E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 400 wrote to memory of 900 400 764b2530d5d53eb19a16030f1acbc810_NEIKI.exe 83 PID 400 wrote to memory of 900 400 764b2530d5d53eb19a16030f1acbc810_NEIKI.exe 83 PID 400 wrote to memory of 900 400 764b2530d5d53eb19a16030f1acbc810_NEIKI.exe 83 PID 400 wrote to memory of 4524 400 764b2530d5d53eb19a16030f1acbc810_NEIKI.exe 84 PID 400 wrote to memory of 4524 400 764b2530d5d53eb19a16030f1acbc810_NEIKI.exe 84 PID 400 wrote to memory of 4524 400 764b2530d5d53eb19a16030f1acbc810_NEIKI.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\764b2530d5d53eb19a16030f1acbc810_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\764b2530d5d53eb19a16030f1acbc810_NEIKI.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
PID:900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵PID:4524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289B
MD5b776fea7db8d2df9fbe3ce9dda27d189
SHA15eeb498091fc207fb7b8e1fc665e16a6ea794483
SHA256da2dec127a84ad570195a94122be733cb26b9294a649ea2cfeac52af29443bcd
SHA512340254ef283299a069c99b67699c27e0016d48e13b11e4072cc7467044ed34189e0f2e9474e6364ab10d811c59025724c0f894376b7608c043ad92eb74b12ab2
-
Filesize
512B
MD5478fec1df0aef79beb699928cb2787fa
SHA1dfff00b9eceaebff908ca9681320d4c770f14814
SHA256c186c06d9bed7785981b05d4c474afd33a83f9ef0e8f5a558505a44af519ec30
SHA5129875eb579e6ab7d8595be86eb53bb8aec6b6d09af4f96742aea1dbcf21fda7e1b7bb561ad5bdbc560472d94e76eca975e33d8ca9ae6e30d1261b86dbb511cf6f
-
Filesize
442KB
MD50e4fb3811ce3d7ad53b1ac064c9ead24
SHA1ba750aba5e02df8db37e589dcca0dad490533ea3
SHA256341613941127bbd2ae2a0f15316e1ab0456c473dbe504279d82dd9efef6e18a8
SHA512c9ea0b2652f1402eb61763fb05034a3aa902e9c6a12143c04cfeb88579f4010507bab511d6fda612d1f2593711a38e9f7c0a71d31e2d987d38261cd68762f8c4